All of lore.kernel.org
 help / color / mirror / Atom feed
* Should this be a dontaudit or an allow in targeted.
@ 2005-10-31 15:04 Daniel J Walsh
  2005-10-31 16:02 ` Stephen Smalley
  0 siblings, 1 reply; 3+ messages in thread
From: Daniel J Walsh @ 2005-10-31 15:04 UTC (permalink / raw)
  To: Stephen Smalley, SE Linux

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172040

Basically if a normal uses does a ps -ef on a system, his process will attempt to read the context of udev and friends that are running at a higher sensitivity level.  So apps like login, udev and others will generate 
AVC messages with MCS policy.

-- 



--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Should this be a dontaudit or an allow in targeted.
  2005-10-31 15:04 Should this be a dontaudit or an allow in targeted Daniel J Walsh
@ 2005-10-31 16:02 ` Stephen Smalley
  2005-11-12  9:49   ` Russell Coker
  0 siblings, 1 reply; 3+ messages in thread
From: Stephen Smalley @ 2005-10-31 16:02 UTC (permalink / raw)
  To: Daniel J Walsh; +Cc: Chad Hanson, Darrel Goeddel, SE Linux

On Mon, 2005-10-31 at 10:04 -0500, Daniel J Walsh wrote:
> https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172040
> 
> Basically if a normal uses does a ps -ef on a system, his process will attempt to read the context of udev and friends that are running at a higher sensitivity level.  So apps like login, udev and others will generate 
> AVC messages with MCS policy.

We already have dontaudit rules for similar kinds of denials under
strict policy when a user process does a ps -el.  Hence, dontaudit seems
appropriate here.  The only case where an unconfined_t process would
encounter such a denial would be due to MCS.

On a related note, it has been suggested (on lspp) that we might need
dontaudit/auditallow rules based on MLS level.  Is that true, or can we
just leverage the existing TE-based rules to control such auditing based
on type (which typically gives us finer granularity anyway)?

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Should this be a dontaudit or an allow in targeted.
  2005-10-31 16:02 ` Stephen Smalley
@ 2005-11-12  9:49   ` Russell Coker
  0 siblings, 0 replies; 3+ messages in thread
From: Russell Coker @ 2005-11-12  9:49 UTC (permalink / raw)
  To: Stephen Smalley; +Cc: Daniel J Walsh, Chad Hanson, Darrel Goeddel, SE Linux

On Tuesday 01 November 2005 03:02, Stephen Smalley <sds@tycho.nsa.gov> wrote:
> On a related note, it has been suggested (on lspp) that we might need
> dontaudit/auditallow rules based on MLS level.  Is that true, or can we
> just leverage the existing TE-based rules to control such auditing based
> on type (which typically gives us finer granularity anyway)?

It seems sensible to have audit controlled on the same basis as access.  So 
for any criteria on which access can be allowed/denied it should be possible 
to base audit decisions on the same criteria.

auditconstrain/mlsauditconstrain?

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2005-11-12  9:49 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2005-10-31 15:04 Should this be a dontaudit or an allow in targeted Daniel J Walsh
2005-10-31 16:02 ` Stephen Smalley
2005-11-12  9:49   ` Russell Coker

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.